PARTICULAR
|
Page No.
|
Quality Improvement through SPC Techniques: A Case Study. Dr. D. R. Prajapati
Abstract:
Statistical process Control (SPC) can be applied most frequently to controlling manufacturing lines but it may be equally applied to any process with a measurable output. Key tools in SPC are control charts and cause & effect diagrams focused on continuous improvement. In this paper, an attempt has been made to implement the some SPC techniques in the industry, producing the Tractor's parts in India. The power of SPC lies in the ability to examine a process and the sources of variation in that process, using tools that give weightage to objective analysis over subjective opinions and that allow the strength of each source to be determined numerically. Only two main tools i.e. cause and effect diagram and control charts are implemented in this industry out of seven SPC tools. The present work deals with the study of defects in Foot Board assembly, Foot step assembly, Fuel tank assembly and Fender of Radiator. After implementing the required suggestions/recommendations for radiator assembly, it is found that process capability is improved and it is greater than required for 400 numbers of observations.
Donload full Lenght Paper......
|
1-35
|
Maximization of Return on Rnvestment (ROI) by Hyper Productive Software
Development Through Scrum.
Muhammad Inam Shahzad, Tasleem Mustafa, Fahad Jan, Muhammad Ashraf and Ahmad Adnan
Abstract:
The Research paper concentrated on the Scrum and focused on how to maximize the return on investment while developing the software especially in the IT (Information Technology) industry of Pakistan. The purpose of the study was to propose improvements in the software development methods. A case study was performed by using two different methods for the development of the project in the computer Centre of Faisalabad Electric Supply Company Faisalabad. The existing method of development in FESCO computer Centre was Lwei-Scrum having many flaws and drawbacks. In order to overcome these drawbacks a new approach of Scrum was applied in FESCO.
Donload full Lenght Paper......
|
36-60
|
The design of a Trusted Authentication scheme for Wimax Network. Mr. Rajesh Shrivastava and Deepak Kumar Mehto
Abstract:
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. IEEE802.16 provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). In this paper, we first overview the IEEE802.16 standard, and then investigate possible attacks on the basic PKMprotocol in IEEE802.16. We also give possible solutions to counter those attacks. Donload full Lenght Paper......
|
61-80
|
Highly Quantitative Mining Association Rules with Clustering. N. Venkatesan
Abstract:
Data mining is a step in the knowledge discovery process consisting of certain data mining algorithms that, under some acceptable computational efficiency limitations, finds patterns or models in data. Association rule analysis starts with transactions containing one or more products or service offerings and some rudimentary information about the transaction. This paper describes the clustering in association rules using quantitative attributes, which are expressive multi-dimensional generalized association rules for university admission. University database which is vast and which has interrelated item sets is chosen for mining. Quantitative attributes can have a very wide range of values defining their domain. Donload full Lenght Paper......
|
81-98
|
An Efficient Routing Scheme for ICMN. K. Soujanya, R. Samba Siva Nayak and M. Rajarajeswari
Abstract:
In this paper, intermittently connected mobile networks are sparse wireless networks where most of the time there does not exist a complete path from the source to the destination. These networks fall into the general category of Delay Tolerant Networks. There are many real networks that follow this paradigm, for example, wildlife tracking sensor networks, military networks, inter-planetary networks, etc. proposed efforts to significantly reduce the overhead of flooding-based schemes has often been Plagued by large delays. With this in mind, we introduce a new routing scheme, called Spray and Wait because it "sprays" a number of copies into the network, & then "waits" till one of these nodes meets the destination. Using theory and simulations we show that Spray and Wait outperforms all existing schemes with respect to average message delivery delay and number of transmissions per message delivered.
Donload full Lenght Paper......
|
99-116
|
Controlling the Menace of Unsolicited Electronic Mails - Contemporary Developments and Indian Perspectives. Sachin Arora and Dr. Dipa Dube
Abstract:
The tremendous growth of the Internet as a vehicle of communication in the 1990s to its transformation to a tool with incredible potential has meant that the marketing nuisances of the physical world have also transferred to the digital world in the form of unsolicited commercial electronic messages or simply 'spam'. Majority of spam messages are concerned with commercial advertising and in some ways is analogous to "junk mail" which people receive through the postal system. Unsolicited Commercial Electronic Messages or spam remains undesirable for several reasons. Consumers hate it because it shifts the cost of advertising onto them as they effectively have to pay to download the message. Internet Service Providers dislike spam because it clogs up their systems and slows the traffic down by reducing storage space and bandwidth. Donload full Lenght Paper......
|
117-151
|
Comparing Search Algorithms of Unstructured P2P Networks. Prashant K. Shukla, Piyush K. Shukla and Prof. Sanjay Silakari
Abstract:
Computing has passed through many stages since the birth of the first computing machines. A centralized solution has one component that is shared by users all the time. All resources are accessible, but there is a single point of control as well as a single point of failure. A distributed system is a group of autonomous computers connected to a computer network, which appears to the clients of the system as a single computer.
Distributed system software allows computers to manage their activities and to share the resources of the system, so that clients recognize the system as a single, integrated computing facility. Opportunity to attach components improves the availability, reliability, fault tolerance and performance of the system. In such systems, the methods for minimizing communication and computation cost are significant.
Donload full Lenght Paper......
|
152-165
|
Determination of Lot Size in the Construction of Six sigma based Link Sampling Plans. R. Radhakrishnan and P. Vasanthamani
Abstract:
The term 'Six Sigma' originated from the terminology associated with the statistical modeling of manufacturing processes. A six-sigma process is one in which 99.99999% of the products manufactured are statistically expected to be free of defects. Acceptance sampling is a statistical procedure for accepting or rejecting a lot or a batch items based on the number of non-conformities found in a sample. Various sampling plans have been designed and these procedures focus on the determination of lot size by assuming the lot size to be either too large or infinite. It is not very convincing to say that a lot is accepted or rejected on the basis of a fixed sample size irrespective of the lot size. Radhakrishnan and Vasanthamani (2009a, 2009b, 2011) determined the lot sizes for single sampling plans, double sampling plans, double sampling plans of the type DSP(0,1) for fixed AOQ. Donload full Lenght Paper......
|
166-178
|
Construction of Mixed Sampling Plans Indexed Through Six Sigma Quality Levels with Chain Sampling Plan-(0, 1) as Attribute Plan. R. Radhakrishnan and J. Glorypersial
Abstract:
Six Sigma is a concept, a process, a measurement, a tool, a quality philosophy, a culture and a management strategy for the improvement in the system of an organization, in order to reduce wastages and increase the profit to the management and enhance satisfaction to the customers. Motorola (1980) first adopted the concept of six sigma in their organization and established that it can produce less than 3.4 defects per million opportunities. Focusing on reduction of defects will result in more profit to the producer and enhanced satisfaction for the consumer. The concept of Six Sigma can be applied in the process of quality control in general and Acceptance sampling in particular. Donload full Lenght Paper......
|
179-199
|
Analysis of optical soliton propagation in birefringent fibers. Ch. Spandana, D. ajay kumar and M. Srinivasa Rao
Abstract:
Before the development of optical communication systems, two major forms of communication systems were employed. In the first of these, namely, electrical communication system, information is encoded as electrical pulses and transmitted through coaxial cable; the other system, i.e., microwave system, uses electromagnetic waves with frequencies in the range of 1 - 10GHz to transmit the signal .These two systems are limited either by bandwidth due to high frequency-dependent loss of coaxial cable of the electrical system, or bit rate due to the low carrier frequencies of the microwave system. Fortunately, these two obstacles could be overcome by using optical communication system, thanks to the invention of the laser in 1960 and the breakthrough technology of low-loss optical fibers in 1970. Specifically, the high frequencies (~100 THz) of the optical pulses increase enormously the bit-rate of the system and the fiber loss has been reduced to below 20 dB/km in a broad wavelength range around 1um. Donload full Lenght Paper......
|
200-213
|
Design of Smart Hybrid Fuzzy Pid Controller for Different Order Process Control. Anil Kamboj and Sonal Gupta
Abstract:
This paper develops a hybrid fuzzy PID controller for different order process control. A smart hybrid fuzzy PID controller which comes from smart combination of classical PID and fuzzy PID controller. Combination is done with the help of switching scheme that makes a decision upon the priority of the two controller parts; namely, the classical PID and the fuzzy constituents. The simulations done on various processes using the smart hybrid fuzzy PID controller provides 'improved' system responses in terms of transient and steady-state performances when compared to the pure classical PID or the pure fuzzy controller applications. Donload full Lenght Paper......
|
214-228
|
Privacy and Trust Management in Cloud Computing. Mahesh A. Sale and Pramila M. Chawan
Abstract:
Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth. In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. The purpose of the paper is to focus on various privacy and trust issues in Cloud Computing with the aim to suggest solutions on them. Donload full Lenght Paper......
|
229-247
|
Sec.AODV for MANETs using MD5 with Cryptography. Mr. Suketu D. Nayak and Mr. Ravindra K. Gupta
Abstract:
Mobile Ad hoc Networks (MANETs) characteristics present major vulnerabilities in security. The threats which thought-out in MANETs are due to maliciousness that intentionally disrupts the network by using variety of attacks and due to insecure routing protocols (e.g. AODV), which were developed without considering security in mind. Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Ad-hoc Networks) are frequently established in insecure environments, which make them more vulnerable to attacks. These attacks are initiated by sharing malicious nodes against different services of network. Ad-hoc On-Demand Distance Vector (AODV) is one such widely used routing protocol that is at present undergo extensive research and development. AODV is based on distance vector routing, but here the updates are shared not on a periodic basis but on an as per demand basis. Donload full Lenght Paper......
|
248-271
|
Implementation of Image Steganography Using Least Significant Bit Insertion Technique. Er. Prajaya Talwar
Abstract:
Transferring information on internet or on any public network is very common now-a-days. However I is not a secure mean of transformation for transmitting any important information. Anyone can hack, peek or copy the information. Therefore one would not prefer to transmit important information without any protection in public network. Cryptography and steganography are two techniques to protect your message. Cryptography leads your text to be meaningless random codes. Steganography is new and exciting field; it involves embedding data into a medium in a way which is not easily detectable. This paper implements the steganography by converting the original data in to BCD code and then embedding the coded data in to digital grayscale images to get stego image. Image steganography in this paper is implemented using least significant bit insertion with BCD codes. Donload full Lenght Paper......
|
272-288
|